Full Papers.- Using Support Vector Machines for Terrorism Information Extraction.- Criminal Incident Data Association Using the OLAP Technology.- A New Frontier in Text Mining.- Web-Based Intelligence Reports System.- Authorship Analysis in Cybercrime Investigation.- Behavior Profiling of Email.- Detecting Deception through Linguistic Analysis.- A Longitudinal Analysis of Language Behavior of Deception in E-mail.- Evacuation A Capacity Constrained Routing Approach.- Locating Hidden Groups in Communication Networks Using Hidden Markov Models.- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department.- Decision Based Spatial Analysis of Crime.- CrimeLink Using Domain Knowledge to Facilitate Automated Crime Association Analysis.- A Spatio Temporal Visualizer for Law Enforcement.- Tracking Hidden Groups Using Communications.- Examining Technology Acceptance by Individual Law Enforcement An Exploratory Study.- "Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age.- Untangling Criminal A Case Study.- Addressing the Homeland Security A Collaborative Decision-Making Framework.- Collaborative Workflow Management for Interagency Crime Analysis.- COPLINK An Architecture for Information Monitoring and Sharing in Law Enforcement.- Active Database Systems for Monitoring and Surveillance.- Integrated "Mixed" Networks Security Monitoring - A Proposed Framework.- Bioterrorism Surveillance with Real-Time Data Warehousing.- Short Papers.- Privacy Sensitive Distributed Data Mining from Multi-party Data.- Biographical Descriptions for Intelligence Analysis.- Scalable Knowledge Extraction from Legacy Sources with SEEK.- "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features.- Emergent Semantics from Users' Browsing Paths.- Designing Agent99 A Learner-Centered, Web-Based Training System for Deception Detection.- Training Professionals to Detect Deception.- An E-mail Monitoring System for Detecting Outflow of Confidential Documents.- Intelligence and Security An Information Economics Perspective.- An International Perspective on Fighting Cybercrime.- Extended Abstracts for Posters.- Hiding Traversal of Tree Structured Data from Untrusted Data Stores.- Criminal Record Matching Based on the Vector Space Model.- Database Support for Exploring Criminal Networks.- Hiding Data and Code Security for Application Hosting Infrastructure.- Secure Information Sharing and Information Retrieval Infrastructure with GridIR.- Semantic Hacking and Intelligence and Security Informatics.